Technology in Action Exam 3. Data ensure, record related information
Unlock all answers in this set
Unlock answersquestion
A _______ is a group of related data that can be stored, sorted, organized, and queried. a) database b) macro c) spreadsheet d) memo
answer
database
question
If a school keeps two lists, one for student registration and one for student financial information, both containing name and address information, this is an example of data _______. a) redundancy b) completeness c) integrity d) normalization
answer
redundancy
question
Data _______ ensures that the data contained in a database is accurate and reliable. a) consistency b) redundancy c) efficiency d) integrity
answer
integrity
question
Data _______ helps to ensure data integrity by maintaining information in only one place. a) centralization b) flexibility c) redundancy d) mapping
answer
centralization
question
21 in a database, the term _______ is synonymous with a category of information. a) record b) table c) row d) field
answer
field
question
In a database, a group of related records is referred to as a(n) _______. a) memo b) object c) field d) table
answer
table
question
In a Microsoft Access database, the Gettysburg Address would be stored in a(n) _______ field. a) text b) short text c) long text d) object
answer
long text
question
You can set a _______, which is automatically displayed in a field unless the user enters something different. a) field type b) default value c) numeric check d) relation
answer
default value
question
Which of the following is NOT a likely primary key? a) Driver's license number b) Social Security number c) Date of birth d) Student ID number
answer
Date of birth
question
_______ is used to ensure that data is organized more efficiently. a) Range checking b) Normalization c) Validation d) Consistency checking
answer
Normalization
question
_______ databases are the most frequently used electronic databases. a) Multidimensional b) Flat-file c) Object-oriented d) Relational
answer
Relational
question
A _______ relationship indicates that for each record in a table, there is only a single corresponding record in a related table. a) many-to-many b) one-to-one c) many-to-one d) one-to-many
answer
one-to-one
question
_______ means that for each value in the foreign key of one table, there is a corresponding value in the primary key of another table. a) Database consistency b) Record integrity c) Normalization d) Referential integrity
answer
Referential integrity
question
Nontraditional data such as audio clips, video clips, pictures, and very large documents are called _______ data. a) enterprise b) unstructured c) multidimensional d) structured
answer
unstructured
question
Data in a multidimensional database is organized in a _______ format. a) cube b) linear d) modular c) cellular
answer
cube
question
A _______ check would be used to restrict the fines for speeding violations from $50 to $250. a) completeness b) range c) consistency d) numeric
answer
range
question
A(n) _______ check determines whether a required field such as LastName was filled in a) consistency b) completeness c) range d) alphabetic
answer
completeness
question
A _______ check compares the values of data in two or more fields to see whether those values are reasonable. a) correctness b) numeric c) consistency d) range
answer
consistency
question
You would use a _______ to temporarily display records of residents of the city of Boston. a) sieve b) validation rule c) filter d) field constraint
answer
filter
question
A(n) _______ is a way of retrieving information from one or more tables that defines a particular subset of data. a) query b) enquiry c) validation rule d) field constraint
answer
query
question
A _______ displays a subset of data from a table (or tables) based on the specified criteria a) join query b) table query c) select query d) criteria query
answer
select query
question
SQL uses _______ to extract records from a database by using English-like expressions that have variables and operations. a) relational algebra b) primary keys c) Boolean algebra d) foreign keys
answer
relational algebra
question
_______ involves putting data into an electronic file in a format that another application can recognize. a) Enhancing b) Extracting c) Exporting d) Importing
answer
Exporting
question
A data _______ is a large-scare electronic repository of data that contains and organizes all of an organization's data in one place. a) mart b) storehouse c) chain d) warehouse
answer
warehouse
question
Data staging consists of all of the following steps EXCEPT _______ a) extracting the data b) transforming the data c) mining the data d) storing the data in a warehouse
answer
mining the data
question
A(n) _______ is designed to improve communications and help employees complete their routine tasks. a) office support system (OSS) b) decision support system (DSS) c) transaction-processing system (TPS) d) management information system (MIS
answer
office support system (OSS)
question
In a transaction-processing system (TPS), if the TPS database can be queried and updated while the transaction is taking place, this is called ________ processing. a) real-time b) immediate c) direct d) batch
answer
real-time
question
Management information systems (MIS) provide reports called _______ reports, which show conditions that are unusual or need attention from users of the system. a) exception b) expert c) summary d) detail
answer
exception
question
The Siri personal assistant application on Apple's iPhone 5s in an example of a _______. a) management information system (MIS b) database management system (DBMS) c) natural language processing (NLP) system d) decision support system (DSS)
answer
natural language processing (NLP) system
question
_______ is the branch of computer science that attempts to create computers that think like humans. a) Natural language processing b) Enterprise resource planning c) Artificial intelligence d) Expert systems
answer
Artificial intelligence
question
A _______ is a group of two or more computers or nodes, designed to share information and resources a) bus b) network c) router d) bridge
answer
network
question
A _______ network can contain servers as well as individual computers. a) client/server b) switch c) peer-to-peer d) distributed
answer
client/server
question
In a _______ network, each node connected to the network communicates directly with every other node. a) bridge b) peer-to-peer c) router d) client/server
answer
peer-to-peer
question
The computers in a lab on a floor of a building would be connected using a _______. a) LAN b) WAN c) PAN d) MAN
answer
LAN
question
A _______ uses the internet communications infrastructure to build a secure and private network a) PAN b) WAN c) HAN d) VPN
answer
VPN
question
A(n) _______ server tracks who is logging on to the network as well as which services on the network are available to each user. a) authentication b) file c) dedicated d) application
answer
authentication
question
A(n) _______ server is a server that stores and manages files for network users. a) print b) file c) database d) e-mail
answer
file
question
A print server uses a print _______ as a software holding area for jobs waiting to be printed. a) heap b) spooler c) stack d) logger
answer
spooler
question
Which of the following is NOT a common network topology? a) Cluster b) Ring c) Linear bus d) Star
answer
Cluster
question
A _______ is a set of rules for how information and communication are exchanged. a) frame b) protocol c) packet d) token
answer
protocol
question
Ring networks use the _______ method to avoid data collisions. a) active-check b) packet screening c) token d) passive-check
answer
token
question
The ends of the cable in a bus network us a(n) _______ to absorb signals so that they are not reflected back to network components that have already received the signals a) terminator b) stopper c) endcap d) block
answer
terminator
question
In a _______ network, data collisions can occur fairly easily because the network is essentially composed of a single cable a) Star b) Bus c) Hierarchical d) Cluster
answer
Bus
question
Which of the following is the most commonly used client/server network topology? a) Ring b) Cluster c) Star d) Hierarchical
answer
Star
question
In an Ethernet network, the signal that is sent to indicate a signal collision is called a _______ signal. a) stop b) hit c) crash d) jam
answer
jam
question
A _______ topology uses more than one topology when building a network. a) hybrid b) fusion c) crossover d) multiple-use
answer
hybrid
question
_______ is the amount of data that can be transmitted across a transmission medium in a certain amount of time. a) Scalability b) Bandwidth c) Infusion d) Data capacity
answer
Bandwidth
question
Which of the following is NOT a factor to consider when selecting network cabling? a) Cable diameter b) Bandwidth c) Maximum run length d) Interference
answer
Cable diameter
question
_______ cable is NOT subject to electromagnetic interference or radio frequency interference. a) Fibre-optic b) Polycarbonate c) Twisted-pair d) Coaxial
answer
Fibre-optic
question
For business networks, which of the following is NOT a main cable type? a) Fibre-optic b) Duplex c) Twisted-pair d) Coaxial
answer
Duplex
question
Most home networks use _______ cable, which is most susceptible to interference. a) coaxial b) fiber-optic c) wi-fi d) unshielded twisted-pair
answer
unshielded twisted-pair
question
_______ is the standard communications protocol used on most client/server networks. a) TCP/IP b) Ethernet c) VPN d) NOS
answer
Ethernet
question
The physical address assigned to each network adapter is called its _______. a) network access control (NAC) b) physical address control (PAC) c) media access control (MAC) d) network physical address (NPA)
answer
media access control (MAC)
question
A(n) _______ address is the address that external entities use when communicating with your network a) IP b) WAP c) ALU d) MAC
answer
IP
question
A _______ sends data from one collision domain to another. a) link b) switch c) bridge d) router
answer
bridge
question
A _______ sends data between two networks a) router b) switch c) repeater d) hub
answer
router
question
A _______ keeps your computer safe by determining who is trying to access it. a) switch b) hub c) firewall d) gateway
answer
firewall
question
Packet _______ is a form of protection from your computer that looks at each packet that comes into your computer network. a) scanning b) sniffing c) viewing d) screening
answer
screening
question
A(n) _______ server is a heavily secured server located between a company's secure internal network and it firewall. a) transitional b) proxy c) armoured d) bastion host
answer
bastion host
question
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a _______. a) worm b) spammer c) Trojan horse d) brute force attack
answer
brute force attack
question
The _______ is responsible for the internet's domain name system and the allocation of IP addresses. a) IAB b) ICANN c) W3C d) ISOC
answer
ICANN
question
The main path of the internet along which data travel the fastest is known as the internet _______. a) cache b) protocol c) backbone d) highway
answer
backbone
question
High-speed _______ communication lines use fibre-optics. a) DSL b) IP c) OC d) cable
answer
OC
question
Individual Internet users connect to ISPs through a(n) _______ a) User Datagram Protocol (UDP) b) optical carrier (OC) line c) point of presence (POP) d) T line
answer
point of presence (POP)
question
The main suite of protocols used on the internet is _______. a) POP c) SMTP d) TCP/IP e) FTP
answer
TCP/IP
question
_______ uses a dedicated connection between to points with the connection remaining active for the duration of the transmission. a) Circuit switching b) A closed circuit c) Packet switching d) An open circuit
answer
Curcuit switching
question
Which of the following information is NOT contained in a packet? a) The address from where the packet originates b) The data that are transmitted c) The size (in bytes) of the packet
answer
The size (in bytes) of the packet
question
A(n) _______ address is a unique number that identifies a computer, server, or device connected to the internet. a) SMTP b) TCP c) NetBIOS d) IP
answer
IP
question
A(n) _______ address us a temporary IP address that is assigned from an available pool of IP addresses. a) static b) transition c) assigned d) dynamic
answer
dynamic
question
An IP address that does not change and is usually assigned manually by a network administrator is called a _______ address. a) fixed b) dynamic c) stationary d) static
answer
static
question
IPV6 was needed when IPV4 _______. a) became too old b) was revoked c) was eliminated d) no longer had enough unique addresses
answer
no longer had enough unique addresses
question
When checking to see whether a particular name is registered on the internet, your computer accesses a database that is kept on a(n) _______ server. a) DNS b) URL c) XML d) FTP
answer
DNS
question
An IP address in the form of 197.169.100.1 is called a(n) _______. a) random number b) sequential access number c) dotted quad d) encryption key
answer
dotted quad
question
In https://www.pearsonhighered.com, which of the following is the top-level domain? a) www b) pearsionhighered c) http d) com
answer
com
question
By adding a network prefix to an IP address, supernetting or _______ lets a single IP address represent multiple unique IP addresses. a) Secure Sockets Layer (SSL) b) Dynamic Host Configuration Protocol (DHCP) c) Internet Protocol version 4 (IPv4) d) classless interdomain routing (CIDR)
answer
classless interdomain routing (CIDR)
question
Which of the following is NOT a language used in developing websites? a) DHTML b) KML c) XML d) HTML
answer
KML
question
Which of the following was created for the transfer hypertext documents across the internet? a) FTP b) SSL c) HTTP d) HTML
answer
HTTP
question
< b > is an example of an HTML _______. a) tag b) indicator c) key d) marker
answer
tag
question
Text such as < b >This should be bolded. is an example of an HTML _______. a) marker b) instruction c) script d) element
answer
element
question
_______ defines the content in terms of the data that is being described rather than how it is to be displayed a) XML b) JavaScript c) HTML d) CGI
answer
XML
question
_______ provides a procedure by which a browser can request that a program file be run rather than just being delivered to the browser. a) OC b) ACK c) UDP d) CGI
answer
CGI
question
A(n) _______ is a small program that resides on server and is designed to be downloaded and run on a client computer a) JavaScript b) applet c) CGI scrip d) app
answer
applet
question
The _______ defines items on the web page as graphics, tables, and headers as objects a) JSON b) MIME c) DOM d) SSL
answer
DOM
question
Which protocol is used when sending files as attachments by e-mail? a) User Datagram Protocol (UDP) b) Post Office Protocol (POP) c) Multipurpose Internet Mail Extensions (MIME) d) Simple Mail Transfer Protocol (SMTP)
answer
Multipurpose Internet Mail Extensions (MIME)
question
In public-key encryption, the two keys - one from coding and one for decoding are known as _______. a) linked keys b) keytags c) a key pair d) code keys
answer
a key pair
question
Which of the following is an example of an instant messenger service? a) Monster b) Yahoo Messenger c) Flickr d) LinkedIn
answer
Yahoo Messenger
question
_______ permits two or more people to communicate over the internet in real time. a) Flickr b) Snapfish c) Instant Messaging d) LinkedIn
answer
Instant messaging
question
Strong encryption now requires _______ -bit keys. a) 128 b) 40 c) 512 d) 256
answer
256
question
Which of the following is NOT a virus category?
answer
Pharming
question
A ________ is a virus that is triggered on a certain date.
answer
time bomb
question
________ viruses are often transmitted by a flash drive left in a USB port.
answer
boot sector
question
Creating and distributing ________ is one of the most widespread types of cybercrimes.
answer
computer viruses
question
Rules for creating passwords include all of the following EXCEPT ________.
answer
use a dictionary to find a lengthy word that is easy to remember
question
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________.
answer
a firewall
question
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
answer
engineering
question
The Internet Crime Complaint Center (IC3) is a partnership between the ________.
answer
FBI and National White Collar Crime Center
question
Which of the following statements about cookies is NOT true?
answer
Cookies obtain your personal information by searching your hard drive.
question
FBI-related scams involve ________.
answer
people pretending to represent official organizations such as the Dept. of Homeland Security or IRS
question
A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________.
answer
launch a denial of service (DoS) attack on your computer
question
A(n) ________ takes advantage of file transport methods to spread on its own.
answer
worm
question
With regard to computer protection, quarantining is defined as ________.
answer
placing a found virus in a secure area on the hard drive
question
Which type of virus was the famous Michelangelo virus?
answer
time bomb
question
Using your computer for non-work activities while you are being paid to work is known as ________.
answer
cyberloafing
question
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________.
answer
pharming
question
Adware and spyware are referred to collectively as ________.
answer
greyware
question
A ________ is named after a housing construction feature that slows the spread of fires from house to house.
answer
firewall
question
________ is a program that gathers information about your surfing habits without your knowledge.
answer
spyware
question
CAPTCHA is ________.
answer
the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website
question
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
answer
virus signiture
question
A ________ is a virus that is attached to documents such as Word or Excel files.
answer
macro virus
question
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge
answer
rootkit
question
The Internet Crime Complaint Center (IC3) is a partnership between the ________.
answer
FBI and National White Collar Crime Center
question
With regard to computer protection, quarantining is defined as ________.
answer
placing a found virus in a secure area on the hard drive
question
FBI-related scams involve ________.
answer
people pretending to represent official organizations such as the Dept. of Homeland Security or IRS
question
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.
answer
logical port blocking
question
________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.
answer
White-hat
question
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
answer
cybercrime
question
All of the following activities may infect your computer with a virus EXCEPT ________.
answer
printing a document
question
All of the following were top cybercrimes reported to the IC3 EXCEPT ________.
answer
theft of service
question
Which of the following classifications of viruses can change its own code to avoid detection?
answer
Polymorphic
question
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
answer
A DDoS attack